Author: Shannon Lewis

Could you have the same vulnerability that led to the Equifax breach?

Regardless of the size of your organization, it’s very likely that you could. Vulnerabilities including the bug reportedly responsible for Equifax’s data breach are... Read more »

Three Misconceptions of Breaking and Inspecting SSL Traffic [Video]

There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability... Read more »

What Are You Doing to Inspect Encrypted Traffic? [Video]

Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols... Read more »

Security for Intent-Based Networking

Networks have become more massive and complex than ever before. This year at Cisco Live US, people were talking about managing and defending networks... Read more »

AlwaysOn Monitoring with Foglight for SQL Server

We often get asked about the breadth and depth of Foglight when it comes to its monitoring scope. Whether it support for a multitude... Read more »

Canada has a new cybersecurity strategy – does it impact you?

Do you do business with companies in Canada? A recent government survey showed that although 94% of Canadian business collect personal data from their... Read more »